Users Guide

Removing the RSA Host Keys and Zeroizing Storage ....................................................................................... 920
Conguring When to Re-generate an SSH Key ..................................................................................................920
Conguring the SSH Server Cipher List................................................................................................................921
Conguring DNS in the SSH Server...................................................................................................................... 921
Conguring the HMAC Algorithm for the SSH Server....................................................................................... 922
Conguring the HMAC Algorithm for the SSH Client.........................................................................................922
Conguring the SSH Server Cipher List............................................................................................................... 923
Conguring the SSH Client Cipher List.................................................................................................................923
Secure Shell Authentication................................................................................................................................... 924
Troubleshooting SSH...............................................................................................................................................926
Telnet............................................................................................................................................................................... 927
VTY Line and Access-Class Conguration..................................................................................................................927
VTY Line Local Authentication and Authorization............................................................................................... 927
VTY Line Remote Authentication and Authorization...........................................................................................928
VTY MAC-SA Filter Support.................................................................................................................................. 928
Two Factor Authentication (2FA)................................................................................................................................ 929
Handling Access-Challenge Message................................................................................................................... 929
Conguring Challenge Response Authentication for SSHv2............................................................................. 929
SMS-OTP Mechanism............................................................................................................................................930
Conguring the System to Drop Certain ICMP Reply Messages............................................................................930
Dell EMC Networking OS Security Hardening...........................................................................................................932
Startup Conguration Verication......................................................................................................................... 932
Conguring the root User Password.....................................................................................................................933
Enabling User Lockout for Failed Login Attempts................................................................................................933
50 Service Provider Bridging........................................................................................................................ 934
VLAN Stacking...............................................................................................................................................................934
Important Points to Remember............................................................................................................................. 935
Congure VLAN Stacking.......................................................................................................................................936
Creating Access and Trunk Ports.......................................................................................................................... 936
Enable VLAN-Stacking for a VLAN....................................................................................................................... 937
Conguring the Protocol Type Value for the Outer VLAN Tag.......................................................................... 937
Conguring Options for Trunk Ports..................................................................................................................... 937
Debugging VLAN Stacking.....................................................................................................................................938
VLAN Stacking in Multi-Vendor Networks...........................................................................................................939
VLAN Stacking Packet Drop Precedence.................................................................................................................. 942
Enabling Drop Eligibility........................................................................................................................................... 942
Honoring the Incoming DEI Value.......................................................................................................................... 943
Marking Egress Packets with a DEI Value............................................................................................................ 944
Dynamic Mode CoS for VLAN Stacking.....................................................................................................................944
Mapping C-Tag to S-Tag dot1p Values...................................................................................................................945
Layer 2 Protocol Tunneling........................................................................................................................................... 946
Implementation Information....................................................................................................................................948
Enabling Layer 2 Protocol Tunneling......................................................................................................................948
Specifying a Destination MAC Address for BPDUs.............................................................................................949
Setting Rate-Limit BPDUs......................................................................................................................................949
28
Contents